CVE-2021-44228
Published at:
-
10-12-2021 11:15
Last modified:
-
17-08-2022 07:46
Total changes:
-
30
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Changed
Scope
None
User interaction
10.0
Base score
3.9
6.0
Exploitability score
Impact score
Verification logic
Reference
- https://logging.apache.org/log4j/2.x/security.html
- [oss-security] 20211210 CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints-Mailing List, Mitigation, Third Party Advisory
- [oss-security] 20211210 Re: CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints-Mailing List, Mitigation, Third Party Advisory
- http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
- https://security.netapp.com/advisory/ntap-20211210-0007/
- 20211210 Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021-Third Party Advisory
- [oss-security] 20211210 Re: CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints-Mailing List, Third Party Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
- https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
- FEDORA-2021-f0f501d01f-Third Party Advisory
- [oss-security] 20211213 CVE-2021-4104: Deserialization of untrusted data in JMSAppender in Apache Log4j 1.2-Mailing List, Third Party Advisory
- [oss-security] 20211213 Re: CVE-2021-4104: Deserialization of untrusted data in JMSAppender in Apache Log4j 1.2-Mailing List, Third Party Advisory
- https://twitter.com/kurtseifried/status/1469345530182455296
- [debian-lts-announce] 20211212 [SECURITY] [DLA 2842-1] apache-log4j2 security update-Mailing List, Third Party Advisory
- DSA-5020-Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
- http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
- http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
- [oss-security] 20211214 CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack-Mailing List, Third Party Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
- VU#930724-Third Party Advisory, US Government Resource
- http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
- http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
- http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
- http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
- [oss-security] 20211215 Re: CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack-Mailing List, Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
- Microsoft’s Response to CVE-2021-44228 Apache Log4j 2-Patch, Third Party Advisory, Vendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
- https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf
- http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf
- http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html
- FEDORA-2021-66d6c484f3-Third Party Advisory
- https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md
- http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://github.com/cisagov/log4j-affected-db
- https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001
- https://support.apple.com/kb/HT213189
- 20220314 APPLE-SA-2022-03-14-7 Xcode 13.3-Mailing List, Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228
- https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html
- 20220721 Open-Xchange Security Advisory 2022-07-21-Mailing List, Third Party Advisory
- http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
- http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html
Keywords